scholarly journals Elastic Computing in the Fog on Internet of Things to Improve the Performance of Low Cost Nodes

Electronics ◽  
2019 ◽  
Vol 8 (12) ◽  
pp. 1489 ◽  
Author(s):  
Rafael Fayos-Jordan ◽  
Santiago Felici-Castell ◽  
Jaume Segura-Garcia ◽  
Adolfo Pastor-Aparicio ◽  
Jesus Lopez-Ballester

The Internet of Things (IoT) is a network widely used with the purpose of connecting almost everything, everywhere to the Internet. To cope with this goal, low cost nodes are being used; otherwise, it would be very expensive to expand so fast. These networks are set up with small distributed devices (nodes) that have a power supply, processing unit, memory, sensors, and wireless communications. In the market, we can find different alternatives for these devices, such as small board computers (SBCs), e.g., Raspberry Pi (RPi)), with different features. Usually these devices run a coarse version of a Linux operating system. Nevertheless, there are many scenarios that require enhanced computational power that these nodes alone are unable to provide. In this context, we need to introduce a kind of collaboration among the devices to overcome their constraints. We based our solution in a combination of clustering techniques (building a mesh network using their wireless capabilities); at the same time we try to orchestrate the resources in order to improve their processing capabilities in an elastic computing fashion. This paradigm is called fog computing on IoT. We propose in this paper the use of cloud computing technologies, such as Linux containers, based on Docker, and a container orchestration platform (COP) to run on the top of a cluster of these nodes, but adapted to the fog computing paradigm. Notice that these technologies are open source and developed for Linux operating system. As an example, in our results we show an IoT application for soundscape monitoring as a proof of concept that it will allow us to compare different alternatives in its design and implementation; in particular, with regard to the COP selection, between Docker Swarm and Kubernetes. We conclude that using and combining these techniques, we can improve the overall computation capabilities of these IoT nodes within a fog computing paradigm.

Fog Computing ◽  
2018 ◽  
pp. 198-207 ◽  
Author(s):  
Chintan M. Bhatt ◽  
C. K. Bhensdadia

The Internet of Things could be a recent computing paradigm, defined by networks of extremely connected things – sensors, actuators and good objects – communication across networks of homes, buildings, vehicles, and even individuals whereas cloud computing could be ready to keep up with current processing and machine demands. Fog computing provides architectural resolution to deal with some of these issues by providing a layer of intermediate nodes what's referred to as an edge network [26]. These edge nodes provide interoperability, real-time interaction, and if necessary, computational to the Cloud. This paper tries to analyse different fog computing functionalities, tools and technologies and research issues.


2017 ◽  
Vol 2 (1) ◽  
pp. 102-112
Author(s):  
Shevchenko A. ◽  
◽  
Puzyrov S.

The concept of digital transformation is very relevant at the moment due to the epidemiological situation and the transition of the world to the digital environment. IoT is one of the main drivers of digital transformation. The Internet of Things (IoT) is an extension of the Internet, which consists of sensors, controllers, and other various devices, the so-called "things," that communicate with each other over the network. In this paper, the development of hardware and software for the organization of fog and edge computing was divided into three levels: hardware, orchestration, application. Application level also was divided into two parts: software and architectural. The hardware was implemented using two versions of the Raspberry Pi: Raspberry Pi 4 and Raspberry Pi Zero, which are connected in master-slave mode. The orchestration used K3S, Knative and Nuclio technologies. Technologies such as Linkerd service network, NATS messaging system, implementation of RPC - GRPC protocol, TDengine database, Apache Ignite, Badger were used to implement the software part of the application level. The architecture part is designed as an API development standard, so it can be applied to a variety of IoT software solutions in any programming language. The system can be used as a platform for construction of modern IoT-solutions on the principle of fog\edge computing. Keywords: Internet of Things, IoT-platform, Container technologies, Digital Twin, API.


Author(s):  
Ranjitha G. ◽  
Pankaj Lathar ◽  
G. M. Siddesh

Fog computing enhances cloud computing to be closer to the processes that act on IOT devices. Fogging was introduced to overcome the cloud computing paradigm which was not able to address some services, applications, and other limitations of cloud computing such as security aspects, bandwidth, and latency. Fog computing provides the direct correlation with the internet of things. IBM and CISCO are linking their concepts of internet of things with the help of fog computing. Application services are hosted on the network edge. It improves the efficiency and reduces the amount of data that is transferred to the cloud for analysis, storage, and processing. Developers write the fog application and deploy it to the access points. Several applications like smart cities, healthcare domain, pre-processing, and caching applications have to be deployed and managed properly.


In the era of new technologies, Fog computing becomes very popular in today’s scenario. Fog computing paradigm brings a concept that extends cloud computing to the edge and close proximity to the Internet of Things (IoT) network. The fundamental components of fog computing are fog nodes. Additionally, fog nodes are energy efficient nodes. Numerous fog nodes are deployed in the associated fields that will handle the Internet of Things (IoT) sensors computation. Meanwhile, the Internet of Things (IoT) faces challenges, among which energy efficiency is one of the most prominent or critical challenges in the current scenario. However, sensor devices are an energy constraintthatcreateshotspotduringtheroutingprocess.Forthis reason,tohandlesuchconstraints,thispaperpresentsaneffective hotspot mechanism using fog nodes that demonstrate the routing process and directed the sensors to choose the routing path as selected by the fog node. Moreover, fog node will act as a decision maker node and maintain the energy efficiency of sensors during the routing as fog nodes are energy efficient nodes. As it moves towards the emergency situation, the most appropriate and effective routing approach has been designed who maintain the energy level of sensors will be high during the routing process. The proposed routing technique could be better performance for the sake of efficient routing in terms of energy consumption and prolonging networklifetime.


Author(s):  
Shuyuan Mary Ho ◽  
Mike Burmester

Any device can now connect to the Internet, and Raspberry Pi is one of the more popular applications, enabling single-board computers to make robotics, devices, and appliances part of the Internet of Things (IoT). The low cost and customizability of Raspberry Pi makes it easily adopted and widespread. Unfortunately, the unprotected Raspberry Pi device—when connected to the Internet—also paves the way for cyber-attacks. Our ability to investigate, collect, and validate digital forensic evidence with confidence using Raspberry Pi has become important. This article discusses and presents techniques and methodologies for the investigation of timestamp variations between different Raspberry Pi ext4 filesystems (Raspbian vs. UbuntuMATE), comparing forensic evidence with that of other ext4 filesystems (i.e., Ubuntu), based on interactions within a private cloud, as well as a public cloud. Sixteen observational principles of file operations were documented to assist in our understanding of Raspberry Pi’s behavior in the cloud environments. This study contributes to IoT forensics for law enforcement in cybercrime investigations.


2017 ◽  
Vol 9 (4) ◽  
pp. 105-113 ◽  
Author(s):  
Chintan Bhatt ◽  
C. K. Bhensdadia

The Internet of Things could be a recent computing paradigm, defined by networks of extremely connected things – sensors, actuators and good objects – communication across networks of homes, buildings, vehicles, and even individuals whereas cloud computing could be ready to keep up with current processing and machine demands. Fog computing provides architectural resolution to deal with some of these issues by providing a layer of intermediate nodes what's referred to as an edge network [26]. These edge nodes provide interoperability, real-time interaction, and if necessary, computational to the Cloud. This paper tries to analyse different fog computing functionalities, tools and technologies and research issues.


Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7226
Author(s):  
Sandy F. da Costa Bezerra ◽  
Airton S. M. Filho ◽  
Flavia C. Delicato ◽  
Atslands R. da Rocha

The recent growth of the Internet of Things’ services and applications has increased data processing and storage requirements. The Edge computing concept aims to leverage the processing capabilities of the IoT and other devices placed at the edge of the network. One embodiment of this paradigm is Fog computing, which provides an intermediate and often hierarchical processing tier between the data sources and the remote Cloud. Among the major benefits of this concept, the end-to-end latency can be decreased, thus favoring time-sensitive applications. Moreover, the data traffic at the network core and the Cloud computing workload can be reduced. Combining the Fog computing paradigm with Complex Event Processing (CEP) and data fusion techniques has excellent potential for generating valuable knowledge and aiding decision-making processes in the Internet of Things’ systems. In this context, we propose a multi-tier complex event processing approach (sensor node, Fog, and Cloud) that promotes fast decision making and is based on information with 98% accuracy. The experiments show a reduction of 77% in the average time of sending messages in the network. In addition, we achieved a reduction of 82% in data traffic.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2017 ◽  
Vol 4 (5) ◽  
pp. 1113-1116 ◽  
Author(s):  
Rong N. Chang ◽  
Xiuzhen Cheng ◽  
Wei Cheng ◽  
Wonjun Lee ◽  
Yingshu Li ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document